Share highlights of your research with respect to new security management technology. Begin by discussing your assessment of the information as a scholarly resource.
Consider the following topics when discussing the information presented in the resource(s): (1 para each)
- Current issues related to using new technology.
- Examples in which new technology has been tested or applied.
- Ways in which the new technology examples may either support or hinder IT security and business objectives.
Include at least two scholarly, academic resources to support your post. Cite your resources using current APA style and format.